mirror of
https://github.com/affaan-m/everything-claude-code.git
synced 2026-04-11 12:03:31 +08:00
79 lines
3.5 KiB
Markdown
79 lines
3.5 KiB
Markdown
---
|
|
name: hipaa-compliance
|
|
description: HIPAA-specific entrypoint for healthcare privacy and security work. Use when a task is explicitly framed around HIPAA, PHI handling, covered entities, BAAs, breach posture, or US healthcare compliance requirements.
|
|
origin: ECC direct-port adaptation
|
|
version: "1.0.0"
|
|
---
|
|
|
|
# HIPAA Compliance
|
|
|
|
Use this as the HIPAA-specific entrypoint when a task is clearly about US healthcare compliance. This skill intentionally stays thin and canonical:
|
|
|
|
- `healthcare-phi-compliance` remains the primary implementation skill for PHI/PII handling, data classification, audit logging, encryption, and leak prevention.
|
|
- `healthcare-reviewer` remains the specialized reviewer when code, architecture, or product behavior needs a healthcare-aware second pass.
|
|
- `security-review` still applies for general auth, input-handling, secrets, API, and deployment hardening.
|
|
|
|
## When to Use
|
|
|
|
- The request explicitly mentions HIPAA, PHI, covered entities, business associates, or BAAs
|
|
- Building or reviewing US healthcare software that stores, processes, exports, or transmits PHI
|
|
- Assessing whether logging, analytics, LLM prompts, storage, or support workflows create HIPAA exposure
|
|
- Designing patient-facing or clinician-facing systems where minimum necessary access and auditability matter
|
|
|
|
## How It Works
|
|
|
|
Treat HIPAA as an overlay on top of the broader healthcare privacy skill:
|
|
|
|
1. Start with `healthcare-phi-compliance` for the concrete implementation rules.
|
|
2. Apply HIPAA-specific decision gates:
|
|
- Is this data PHI?
|
|
- Is this actor a covered entity or business associate?
|
|
- Does a vendor or model provider require a BAA before touching the data?
|
|
- Is access limited to the minimum necessary scope?
|
|
- Are read/write/export events auditable?
|
|
3. Escalate to `healthcare-reviewer` if the task affects patient safety, clinical workflows, or regulated production architecture.
|
|
|
|
## HIPAA-Specific Guardrails
|
|
|
|
- Never place PHI in logs, analytics events, crash reports, prompts, or client-visible error strings.
|
|
- Never expose PHI in URLs, browser storage, screenshots, or copied example payloads.
|
|
- Require authenticated access, scoped authorization, and audit trails for PHI reads and writes.
|
|
- Treat third-party SaaS, observability, support tooling, and LLM providers as blocked-by-default until BAA status and data boundaries are clear.
|
|
- Follow minimum necessary access: the right user should only see the smallest PHI slice needed for the task.
|
|
- Prefer opaque internal IDs over names, MRNs, phone numbers, addresses, or other identifiers.
|
|
|
|
## Examples
|
|
|
|
### Example 1: Product request framed as HIPAA
|
|
|
|
User request:
|
|
|
|
> Add AI-generated visit summaries to our clinician dashboard. We serve US clinics and need to stay HIPAA compliant.
|
|
|
|
Response pattern:
|
|
|
|
- Activate `hipaa-compliance`
|
|
- Use `healthcare-phi-compliance` to review PHI movement, logging, storage, and prompt boundaries
|
|
- Verify whether the summarization provider is covered by a BAA before any PHI is sent
|
|
- Escalate to `healthcare-reviewer` if the summaries influence clinical decisions
|
|
|
|
### Example 2: Vendor/tooling decision
|
|
|
|
User request:
|
|
|
|
> Can we send support transcripts and patient messages into our analytics stack?
|
|
|
|
Response pattern:
|
|
|
|
- Assume those messages may contain PHI
|
|
- Block the design unless the analytics vendor is approved for HIPAA-bound workloads and the data path is minimized
|
|
- Require redaction or a non-PHI event model when possible
|
|
|
|
## Related Skills
|
|
|
|
- `healthcare-phi-compliance`
|
|
- `healthcare-reviewer`
|
|
- `healthcare-emr-patterns`
|
|
- `healthcare-eval-harness`
|
|
- `security-review`
|